Enhancing information security of renewable smart grids by utilizing an integrated online-offline framework

Author(s):  
Vahid Sohrabi Tabar ◽  
Saeid Ghassemzadeh ◽  
Sajjad Tohidi ◽  
Pierluigi Siano
Energies ◽  
2020 ◽  
Vol 13 (23) ◽  
pp. 6267
Author(s):  
Pil-Sung Woo ◽  
Balho H. Kim

Smart grids (SGs) are attracting attention as high value-added platforms, which mass-produce new business models through real-time information sharing. However, the open-ended information structure of SGs increases the risk of exposure to cyberattacks through the creation of multiple communication access points. In a power system where a real-time balance of supply and demand is essential, cyberattacks result in cascading failures leading to power outages. Therefore, this paper proposes a method to evaluate the robustness of large-scale SGs against cybersecurity disturbances. The proposed evaluation method established a hierarchy quantification technique considering the structural characteristics of SGs. With respect to the cyber hierarchy, relevant standards (NERC CIP, NIST FIPS) were applied to classify the grades of information security risk. In the case of physical hierarchy, the power system was calculated by using optimal power flow and analyzed the frequency stability. This study was aimed at identifying the vulnerabilities in the physical topology aspect of intelligent power systems due to cybersecurity disturbances.


2020 ◽  
Vol 185 ◽  
pp. 02003
Author(s):  
Jianxuan Zhang

In view of the increasingly important position of information security in the development of smart grids, this paper studies the threats and defense strategies of smart grids to information security, and provides guidance for how to solve the information security problems of smart grids. At the same time, the concept and threat of smart grid are described. On this basis, several defense strategies are proposed, including encryption, digital signature recognition, firewall, antivirus, intrusion detection, physical isolation and in- depth defense of information security. The analysis shows that the threat faced by human beings is information security. Information security should focus on the development and construction of smart grids. Several defense strategies are feasible and can provide effective support for the safe and stable operation of smart grids.


2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Hua Dong ◽  
Jun Zhao ◽  
Xiaoyu Yang ◽  
Kun Yang

As a modern power infrastructure, smart grids have great advantages over traditional power grids, but their effective operation is largely restricted by information security. Hence, a smart grid information security risk assessment (ISRA) method is proposed. This method combines D numbers to improve the classical analytic hierarchy process (D-AHP) independent of experts’ subjective qualitative assessment and then integrated with grey theory which does not require complete and unambiguous information. First, we establish a smart grid ISRA system according to the characteristics and development reality of smart grid technology. The proposed system includes 5 first-level indexes as an intelligent terminal, a wireless communication channel, password security, application code and embedded system, and corresponding 13 secondary indexes. Second, a D-AHP method aimed at the uncertainty of human subjective judgment and fuzziness of language assessment is used to obtain the weight of each index. The D-AHP method is then combined with the grey assessment matrix solved by grey theory, to obtain the comprehensive assessment value and corresponding risk grade. With a smart grid demonstration project in Suzhou, China, as an example, an empirical study is carried out using expert scoring. The comprehensive assessment risk value is 3.8199, and the corresponding risk level is moderate. The results of this work could serve as a reference for the information security protection of smart grids.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document